Jump to content


NEW UPDATES Debian

debian updates sunrat bruno v.t. eric layton

  • Please log in to reply
1487 replies to this topic

#1376 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 18 January 2018 - 07:00 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4091-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 18, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mysql-5.5
CVE ID         : CVE-2018-2562 CVE-2018-2622 CVE-2018-2640 CVE-2018-2665
                 CVE-2018-2668

Several issues have been discovered in the MySQL database server. The
vulnerabilities are addressed by upgrading MySQL to the new upstream
version 5.5.59, which includes additional changes. Please see the MySQL
5.5 Release Notes and Oracle's Critical Patch Update advisory for
further details:

https://dev.mysql.co...ews-5-5-59.html
http://www.oracle.co...18-3236628.html

For the oldstable distribution (jessie), these problems have been fixed
in version 5.5.59-0+deb8u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1377 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 19 January 2018 - 06:07 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4092-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
January 19, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : awstats
CVE ID         : CVE-2017-1000501
Debian Bug     : 885835

The cPanel Security Team discovered that awstats, a log file analyzer,
was vulnerable to path traversal attacks. A remote unauthenticated
attacker could leverage that to perform arbitrary code execution.

For the oldstable distribution (jessie), this problem has been fixed
in version 7.2+dfsg-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 7.6+dfsg-1+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1378 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 23 January 2018 - 06:28 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4093-1                   security@debian.org
https://www.debian.org/security/                                        
January 21, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openocd
CVE ID         : CVE-2018-5704
Debian Bug     : 887488

Josef Gajdusek discovered that OpenOCD, a JTAG debugger for ARM and MIPS,
was vulnerable to Cross Protocol Scripting attacks. An attacker could
craft a HTML page that, when visited by a victim running OpenOCD, could
execute arbitrary commands on the victims host.

This fix also sets the OpenOCD default binding to localhost, instead of
every network interfaces. This can be changed with the added "bindto"
command argument.

For the oldstable distribution (jessie), this problem has been fixed
in version 0.8.0-4+deb7u1.

For the stable distribution (stretch), this problem has been fixed in
version 0.9.0-1+deb8u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4094-1                   security@debian.org
https://www.debian.org/security/                                        
January 22, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : smarty3
CVE ID         : CVE-2017-1000480
Debian Bug     : 886460

It was discovered that Smarty, a PHP template engine, was vulnerable to
code-injection attacks. An attacker was able to craft a filename in
comments that could lead to arbitrary code execution on the host running
Smarty.

For the oldstable distribution (jessie), this problem has been fixed
in version 3.1.21-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 3.1.31+20161214.1.c7d42e4+selfpack1-2+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1379 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 24 January 2018 - 07:09 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4095-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
January 24, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gcab
CVE ID         : CVE-2018-5345
Debian Bug     : 887776

It was discovered that gcab, a Microsoft Cabinet file manipulation tool,
is prone to a stack-based buffer overflow vulnerability when extracting
.cab files. An attacker can take advantage of this flaw to cause a
denial-of-service or, potentially the execution of arbitrary code with
the privileges of the user running gcab, if a specially crafted .cab
file is processed.

For the stable distribution (stretch), this problem has been fixed in
version 0.7-2+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1380 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 26 January 2018 - 08:16 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4096-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 25, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2018-5089 CVE-2018-5091 CVE-2018-5095 CVE-2018-5096
                 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102
                 CVE-2018-5103 CVE-2018-5104 CVE-2018-5117

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors, use-after-frees, integer
overflows and other implementation errors may lead to the execution of
arbitrary code, denial of service or URL spoofing.

For the oldstable distribution (jessie), these problems have been fixed
in version 52.6.0esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.6.0esr-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4097-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 25, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : poppler
CVE ID         : CVE-2017-14929 CVE-2017-1000456

Multiple vulnerabilities were discovered in the poppler PDF rendering
library, which could result in denial of service or the execution of
arbitrary code if a malformed PDF file is processed.

This update also fixes a regression in the handling of Type 3 fonts.

For the oldstable distribution (jessie), these problems have been fixed
in version 0.26.5-2+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 0.48.0-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4098-1                   security@debian.org
https://www.debian.org/security/                       Alessandro Ghedini
January 26, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : curl
CVE ID         : CVE-2018-1000005 CVE-2018-1000007

Two vulnerabilities were discovered in cURL, an URL transfer library.

CVE-2018-1000005

    Zhouyihai Ding discovered an out-of-bounds read in the code
    handling HTTP/2 trailers. This issue doesn't affect the oldstable
    distribution (jessie).

CVE-2018-1000007

    Craig de Stigter discovered that authentication data might be leaked
    to third parties when following HTTP redirects.

For the oldstable distribution (jessie), these problems have been fixed
in version 7.38.0-4+deb8u9.

For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u4.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1381 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 30 January 2018 - 07:30 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4099-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 27, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ffmpeg
CVE ID         : CVE-2017-17081

Several vulnerabilities have been discovered in the FFmpeg multimedia
framework, which could result in denial of service or potentially the
execution of arbitrary code if malformed files/streams are processed.

For the stable distribution (stretch), this problem has been fixed in
version 7:3.2.10-1~deb9u1.
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4100-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 27, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tiff
CVE ID         : CVE-2017-9935 CVE-2017-11335 CVE-2017-12944 CVE-2017-13726
                 CVE-2017-13727 CVE-2017-18013

Multiple vulnerabilities have been discovered in the libtiff library and
the included tools, which may result in denial of service or the
execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 4.0.3-12.3+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 4.0.8-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4101-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 28, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
CVE ID         : CVE-2018-5334 CVE-2018-5335 CVE-2018-5336

It was discovered that wireshark, a network protocol analyzer, contained
several vulnerabilities in the dissectors/file parsers for IxVeriWave,
WCP, JSON, XML, NTP, XMPP and GDB, which could result in denial of
dervice or the execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version (1.12.1+g01b65bf-4+deb8u13.

For the stable distribution (stretch), these problems have been fixed in
version 2.2.6+g32dac6a-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4094-2                   security@debian.org
https://www.debian.org/security/                                        
January 30, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : smarty3
CVE ID         : CVE-2017-1000480
Debian Bug     : 886460

Côme Chilliet from the FusionDirectory team detected a regression in the
previously issued fix for CVE-2017-1000480. This regression only affects
the Jessie version of the patch. For reference, the relevant part of the
original advisory text follows.

It was discovered that Smarty, a PHP template engine, was vulnerable to
code-injection attacks. An attacker was able to craft a filename in
comments that could lead to arbitrary code execution on the host running
Smarty.

For the oldstable distribution (jessie), this problem has been fixed
in version 3.1.21-1+deb8u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4102-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 30, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : thunderbird
CVE ID         : CVE-2018-5089 CVE-2018-5091 CVE-2018-5095 CVE-2018-5096
                 CVE-2018-5097 CVE-2018-5098 CVE-2018-5099 CVE-2018-5102
                 CVE-2018-5103 CVE-2018-5104 CVE-2018-5117

Multiple security issues have been found in Thunderbird, which may lead
to the execution of arbitrary code, denial of service or URL spoofing.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:52.6.0-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1:52.6.0-1~deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1382 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 01 February 2018 - 06:57 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4103-1                   security@debian.org
https://www.debian.org/security/                          Michael Gilbert
January 31, 2018                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : chromium-browser
CVE ID         : CVE-2017-15420 CVE-2017-15429 CVE-2018-6031 CVE-2018-6032
                 CVE-2018-6033 CVE-2018-6034 CVE-2018-6035 CVE-2018-6036
                 CVE-2018-6037 CVE-2018-6038 CVE-2018-6039 CVE-2018-6040
                 CVE-2018-6041 CVE-2018-6042 CVE-2018-6043 CVE-2018-6045
                 CVE-2018-6046 CVE-2018-6047 CVE-2018-6048 CVE-2018-6049
                 CVE-2018-6050 CVE-2018-6051 CVE-2018-6052 CVE-2018-6053
                 CVE-2018-6054

Several vulnerabilities have been discovered in the chromium web browser.

CVE-2017-15420

    Drew Springall discovered a URL spoofing issue.

CVE-2017-15429

    A cross-site scripting issue was discovered in the v8 javascript
    library.

CVE-2018-6031

    A use-after-free issue was discovered in the pdfium library.

CVE-2018-6032

    Jun Kokatsu discovered a way to bypass the same origin policy.

CVE-2018-6033

    Juho Nurminen discovered a race condition when opening downloaded
    files.

CVE-2018-6034

    Tobias Klein discovered an integer overflow issue.

CVE-2018-6035

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6036

    UK's National Cyper Security Centre discovered an integer overflow
    issue.

CVE-2018-6037

    Paul Stone discovered an issue in the autofill feature.

CVE-2018-6038

    cloudfuzzer discovered a buffer overflow issue.

CVE-2018-6039

    Juho Nurminen discovered a cross-site scripting issue in the
    developer tools.

CVE-2018-6040

    WenXu Wu discovered a way to bypass the content security policy.

CVE-2018-6041

    Luan Herrera discovered a URL spoofing issue.

CVE-2018-6042

    Khalil Zhani discovered a URL spoofing issue.

CVE-2018-6043

    A character escaping issue was discovered.

CVE-2018-6045

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6046

    Rob Wu discovered a way for extensions to access devtools.

CVE-2018-6047

    Masato Kinugawa discovered an information leak issue.

CVE-2018-6048

    Jun Kokatsu discoverd a way to bypass the referrer policy.

CVE-2018-6049

    WenXu Wu discovered a user interface spoofing issue.

CVE-2018-6050

    Jonathan Kew discovered a URL spoofing issue.

CVE-2018-6051

    Anonio Sanso discovered an information leak issue.

CVE-2018-6052

    Tanner Emek discovered that the referrer policy implementation
    was incomplete.

CVE-2018-6053

    Asset Kabdenov discoved an information leak issue.

CVE-2018-6054

    Rob Wu discovered a use-after-free issue.

For the oldstable distribution (jessie), security support for chromium
has been discontinued.

For the stable distribution (stretch), these problems have been fixed in
version 64.0.3282.119-1~deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1383 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 05 February 2018 - 07:27 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4104-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 04, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : p7zip
CVE ID         : CVE-2017-17969
Debian Bug     : 888297

'landave' discovered a heap-based buffer overflow vulnerability in the
NCompress::NShrink::CDecoder::CodeReal method in p7zip, a 7zr file
archiver with high compression ratio. A remote attacker can take
advantage of this flaw to cause a denial-of-service or, potentially the
execution of arbitrary code with the privileges of the user running
p7zip, if a specially crafted shrinked ZIP archive is processed.

For the oldstable distribution (jessie), this problem has been fixed
in version 9.20.1~dfsg.1-4.1+deb8u3.

For the stable distribution (stretch), this problem has been fixed in
version 16.02+dfsg-3+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1384 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 07 February 2018 - 06:42 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4105-1                   security@debian.org
https://www.debian.org/security/                                        
February 06, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mpv
CVE ID         : CVE-2018-6360
Debian Bug     : 888654

It was discovered that mpv, a media player, was vulnerable to remote code
execution attacks. An attacker could craft a malicious web page that,
when used as an argument in mpv, could execute arbitrary code in the host
of the mpv user.

For the stable distribution (stretch), this problem has been fixed in
version 0.23.0-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4106-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 07, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libtasn1-6
CVE ID         : CVE-2017-10790 CVE-2018-6003
Debian Bug     : 867398

Two vulnerabilities were discovered in Libtasn1, a library to manage
ASN.1 structures, allowing a remote attacker to cause a denial of
service against an application using the Libtasn1 library.

For the stable distribution (stretch), these problems have been fixed in
version 4.10-1.1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4107-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 07, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : django-anymail
CVE ID         : CVE-2018-6596
Debian Bug     : 889450

It was discovered that the webhook validation of Anymail, a Django email
backends for multiple ESPs, is prone to a timing attack. A remote
attacker can take advantage of this flaw to obtain a
WEBHOOK_AUTHORIZATION secret and post arbitrary email tracking events.

For the stable distribution (stretch), this problem has been fixed in
version 0.8-2+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1385 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 10 February 2018 - 06:35 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4105-2                   security@debian.org
https://www.debian.org/security/                                        
February 08, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mpv
CVE ID         : CVE-2018-6360
Debian Bug     : 889892

A regression was detected in the previously issued fix for CVE-2018-6360.
The patch released with DSA 4105-1 broke the feature of invoking mpv with
raw YouTube ids. This update fixes this functionality issue. For
reference, the relevant part of the original advisory text follows.

It was discovered that mpv, a media player, was vulnerable to remote code
execution attacks. An attacker could craft a malicious web page that,
when used as an argument in mpv, could execute arbitrary code in the host
of the mpv user.

For the stable distribution (stretch), this problem has been fixed in
version 0.23.0-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4108-1                   security@debian.org
https://www.debian.org/security/                          Thijs Kinkhorst
February 09, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mailman
CVE ID         : CVE-2018-5950
Debian Bug     : 888201

Calum Hutton and the Mailman team discovered a cross site scripting and
information leak vulnerability in the user options page. A remote
attacker could use a crafted URL to steal cookie information or to
fish for whether a user is subscribed to a list with a private roster.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.1.18-2+deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 2.1.23-1+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4109-1                   security@debian.org
https://www.debian.org/security/                                        
February 09, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ruby-omniauth
CVE ID         : CVE-2017-18076
Debian Bug     : 888523

Lalith Rallabhandi discovered that OmniAuth, a Ruby library for
implementing multi-provider authentication in web applications,
mishandled and leaked sensitive information. An attacker with access to
the callback environment, such as in the case of a crafted web
application, can request authentication services from this module and
access to the CSRF token.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.2.1-1+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.3.1-1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4110-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 10, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : exim4
CVE ID         : CVE-2018-6789
Debian Bug     : 890000

Meh Chang discovered a buffer overflow flaw in a utility function used
in the SMTP listener of Exim, a mail transport agent. A remote attacker
can take advantage of this flaw to cause a denial of service, or
potentially the execution of arbitrary code via a specially crafted
message.

For the oldstable distribution (jessie), this problem has been fixed
in version 4.84.2-2+deb8u5.

For the stable distribution (stretch), this problem has been fixed in
version 4.89-2+deb9u3.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1386 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 12 February 2018 - 08:29 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4111-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 11, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libreoffice
CVE ID         : CVE-2018-6871

Mikhail Klementev, Ronnie Goodrich and Andrew Krasichkov discovered that
missing restrictions in the implementation of the WEBSERVICE function
in LibreOffice could result in the disclosure of arbitrary files
readable by the user who opens a malformed document.

For the stable distribution (stretch), this problem has been fixed in
version 1:5.2.7-1+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4111-2                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 12, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libreoffice
CVE ID         : CVE-2018-6871

Mikhail Klementev, Ronnie Goodrich and Andrew Krasichkov discovered that
missing restrictions in the implementation of the WEBSERVICE function
in LibreOffice could result in the disclosure of arbitrary files
readable by the user who opens a malformed document.

For the oldstable distribution (jessie), this problem has been fixed in
version 1:4.3.3-2+deb8u10
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1387 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 15 February 2018 - 11:22 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4112-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 14, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2017-17563 CVE-2017-17564 CVE-2017-17565
                 CVE-2017-17566

Multiple vulnerabilities have been discovered in the Xen hypervisor:

CVE-2017-17563

    Jan Beulich discovered that an incorrect reference count overflow
    check in x86 shadow mode may result in denial of service or
    privilege escalation.

CVE-2017-17564

    Jan Beulich discovered that improper x86 shadow mode reference count
    error handling may result in denial of service or privilege
    escalation.

CVE-2017-17565

    Jan Beulich discovered that an incomplete bug check in x86 log-dirty
    handling may result in denial of service.

CVE-2017-17566

    Jan Beulich discovered that x86 PV guests may gain access to
    internally used pages which could result in denial of service or
    potential privilege escalation.

In addition this update ships the "Comet" shim to address the Meltdown
class of vulnerabilities for guests with legacy PV kernels. In addition,
the package provides the "Xen PTI stage 1" mitigation which is built-in
and enabled by default on Intel systems, but can be disabled with
`xpti=false' on the hypervisor command line (It does not make sense to
use both xpti and the Comet shim.)

Please refer to the following URL for more details on how to configure
individual mitigation strategies:
https://xenbits.xen....visory-254.html

Additional information can also be found in README.pti and README.comet.

For the stable distribution (stretch), these problems have been fixed in
version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u4.1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4113-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 14, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libvorbis
CVE ID         : CVE-2017-14632 CVE-2017-14633

Two vulnerabilities were discovered in the libraries of the Vorbis audio
compression codec, which could result in denial of service or the
execution of arbitrary code if a malformed media file is processed.

For the stable distribution (stretch), these problems have been fixed in
version 1.3.5-4+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4114-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
February 15, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : jackson-databind
CVE ID         : CVE-2017-17485 CVE-2018-5968
Debian Bug     : 888316 888318

It was discovered that jackson-databind, a Java library used to parse
JSON and other data formats, did not properly validate user input
before attempting deserialization. This allowed an attacker to perform
code execution by providing maliciously crafted input.

For the oldstable distribution (jessie), these problems have been fixed
in version 2.4.2-2+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 2.8.6-1+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4115-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 15, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : quagga
CVE ID         : CVE-2018-5378 CVE-2018-5379 CVE-2018-5380 CVE-2018-5381

Several vulnerabilities have been discovered in Quagga, a routing
daemon. The Common Vulnerabilities and Exposures project identifies the
following issues:

CVE-2018-5378

    It was discovered that the Quagga BGP daemon, bgpd, does not
    properly bounds check data sent with a NOTIFY to a peer, if an
    attribute length is invalid. A configured BGP peer can take
    advantage of this bug to read memory from the bgpd process or cause
    a denial of service (daemon crash).

    https://www.quagga.n...a-2018-0543.txt

CVE-2018-5379

    It was discovered that the Quagga BGP daemon, bgpd, can double-free
    memory when processing certain forms of UPDATE message, containing
    cluster-list and/or unknown attributes, resulting in a denial of
    service (bgpd daemon crash).

    https://www.quagga.n...a-2018-1114.txt

CVE-2018-5380

    It was discovered that the Quagga BGP daemon, bgpd, does not
    properly handle internal BGP code-to-string conversion tables.

    https://www.quagga.n...a-2018-1550.txt

CVE-2018-5381

    It was discovered that the Quagga BGP daemon, bgpd, can enter an
    infinite loop if sent an invalid OPEN message by a configured peer.
    A configured peer can take advantage of this flaw to cause a denial
    of service (bgpd daemon not responding to any other events; BGP
    sessions will drop and not be reestablished; unresponsive CLI
    interface).

    https://www.quagga.n...a-2018-1975.txt

For the oldstable distribution (jessie), these problems have been fixed
in version 0.99.23.1-1+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 1.1.1-3+deb9u2.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1388 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 17 February 2018 - 05:45 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4116-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 16, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : plasma-workspace
CVE ID         : CVE-2018-6791

Krzysztof Sieluzycki discovered that the notifier for removable devices
in the KDE Plasma workspace performed insufficient sanitisation of
FAT/VFAT volume labels, which could result in the execution of arbitrary
shell commands if a removable device with a malformed disk label is
mounted.

For the stable distribution (stretch), this problem has been fixed in
version 4:5.8.6-2.1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4117-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 17, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gcc-4.9
CVE ID         : not applicable

This update doesn't fix a vulnerability in GCC itself, but instead
provides support for building retpoline-enabled Linux kernel updates.

For the oldstable distribution (jessie), this problem has been fixed
in version 4.9.2-10+deb8u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4118-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 17, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : tomcat-native
CVE ID         : CVE-2017-15698

Jonas Klempel reported that tomcat-native, a library giving Tomcat
access to the Apache Portable Runtime (APR) library's network connection
(socket) implementation and random-number generator, does not properly
handle fields longer than 127 bytes when parsing the AIA-Extension field
of a client certificate. If OCSP checks are used, this could result in
client certificates that should have been rejected to be accepted.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.1.32~repack-2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.2.12-2+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1389 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 20 February 2018 - 04:58 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4119-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 19, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libav
CVE ID         : CVE-2017-16803

Several security issues have been corrected in multiple demuxers and
decoders of the libav multimedia library. A full list of the changes is
available at
https://git.libav.or...efs/tags/v11.12

For the oldstable distribution (jessie), this problem has been fixed
in version 6:11.12-1~deb8u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1390 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 23 February 2018 - 09:51 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4121-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 22, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : gcc-6
CVE ID         : not applicable

This update doesn't fix a vulnerability in GCC itself, but instead
provides support for building retpoline-enabled Linux kernel updates.

For the stable distribution (stretch), this problem has been fixed in
version 6.3.0-18+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4120-1                   security@debian.org
https://www.debian.org/security/                        Yves-Alexis Perez
February 22, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
CVE ID         : CVE-2017-5715 CVE-2017-5754 CVE-2017-13166 CVE-2018-5750

Several vulnerabilities have been discovered in the Linux kernel that may
lead to a privilege escalation, denial of service or information leaks.

CVE-2017-5715

    Multiple researchers have discovered a vulnerability in various
    processors supporting speculative execution, enabling an attacker
    controlling an unprivileged process to read memory from arbitrary
    addresses, including from the kernel and all other processes running on
    the system.

    This specific attack has been named Spectre variant 2 (branch target
    injection) and is mitigated in the Linux kernel for the Intel x86-64
    architecture by using the 'retpoline' compiler feature which allows
    indirect branches to be isolated from speculative execution.

CVE-2017-5754

    Multiple researchers have discovered a vulnerability in Intel
    processors, enabling an attacker controlling an unprivileged process to
    read memory from arbitrary addresses, including from the kernel and all
    other processes running on the system.

    This specific attack has been named Meltdown and is addressed in the
    Linux kernel on the powerpc/ppc64el architectures by flushing the L1
    data cache on exit from kernel mode to user mode (or from hypervisor to
    kernel).
    
    This works on Power7, Power8 and Power9 processors.

CVE-2017-13166

    A bug in the 32-bit compatibility layer of the v4l2 IOCTL handling code
    has been found. Memory protections ensuring user-provided buffers always
    point to userland memory were disabled, allowing . This bug could be
    exploited by an attacker to overwrite kernel memory from an unprivileged
    userland process, leading to privilege escalation.

CVE-2018-5750

    An information leak has been found in the Linux kernel. The
    acpi_smbus_hc_add() prints a kernel address in the kernel log at every
    boot, which could be used by an attacker on the system to defeat kernel
    ASLR.

Additionnaly to those vulnerability, some mitigations for CVE-2017-5753 are
included in this release.

CVE-2017-5753

    Multiple researchers have discovered a vulnerability in various
    processors supporting speculative execution, enabling an attacker
    controlling an unprivileged process to read memory from arbitrary
    addresses, including from the kernel and all other processes running on
    the system.

    This specific attack has been named Spectre variant 1 (bounds-check
    bypass) and is mitigated in the Linux kernel architecture by identifying
    vulnerable code sections (array bounds checking followed by array
    access) and replacing the array access with the speculation-safe
    array_index_nospec() function.

    More use sites will be added over time.

For the stable distribution (stretch), these problems have been fixed in
version 4.9.82-1+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4122-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 23, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : squid3
CVE ID         : CVE-2018-1000024 CVE-2018-1000027
Debian Bug     : 888719 888720

Several vulnerabilities have been discovered in Squid3, a fully featured
web proxy cache. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2018-1000024

    Louis Dion-Marcil discovered that Squid does not properly handle
    processing of certain ESI responses. A remote server delivering
    certain ESI response syntax can take advantage of this flaw to cause
    a denial of service for all clients accessing the Squid service.
    This problem is limited to the Squid custom ESI parser.

    http://www.squid-cac...QUID-2018_1.txt

CVE-2018-1000027

    Louis Dion-Marcil discovered that Squid is prone to a denial of
    service vulnerability when processing ESI responses or downloading
    intermediate CA certificates. A remote attacker can take advantage
    of this flaw to cause a denial of service for all clients accessing
    the Squid service.

    http://www.squid-cac...QUID-2018_2.txt

For the oldstable distribution (jessie), these problems have been fixed
in version 3.4.8-6+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 3.5.23-5+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1391 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 26 February 2018 - 10:41 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4123-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 24, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : drupal7
CVE ID         : not yet available
Debian Bug     : 891154 891153 891152 891150

Multiple vulnerabilities have been found in the Drupal content management
framework. For additional information, please refer to the upstream
advisory at https://www.drupal.o...a-core-2018-001

For the oldstable distribution (jessie), this problem has been fixed
in version 7.32-1+deb8u10.

For the stable distribution (stretch), this problem has been fixed in
version 7.52-2+deb9u2.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1392 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 27 February 2018 - 05:30 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4124-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
February 27, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : lucene-solr
CVE ID         : CVE-2017-3163 CVE-2017-12629

Two vulnerabilities have been found in Solr, a search server based on
Lucene, which could result in the execution of arbitrary code or
path traversal.

For the oldstable distribution (jessie), these problems have been fixed
in version 3.6.2+dfsg-5+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 3.6.2+dfsg-10+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4125-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
February 27, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wavpack
CVE ID         : CVE-2018-6767 CVE-2018-7253 CVE-2018-7254
Debian Bug     : 889274 889276 889559

Joonun Jang discovered several problems in wavpack, an audio
compression format suite. Incorrect processing of input resulted in
several heap- and stack-based buffer overflows, leading to application
crash or potential code execution.

For the stable distribution (stretch), these problems have been fixed
in version 5.0.0-2+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4126-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
February 27, 2018                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xmltooling
CVE ID         : CVE-2018-0489

Kelby Ludwig and Scott Cantor discovered that the Shibboleth service
provider is vulnerable to impersonation attacks and information
disclosure due to incorrect XML parsing. For additional details please
refer to the upstream advisory at
https://shibboleth.n...dv_20180227.txt

For the oldstable distribution (jessie), this problem has been fixed
in version 1.5.3-2+deb8u3.

For the stable distribution (stretch), this problem has been fixed in
version 1.6.0-4+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1393 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 02 March 2018 - 07:14 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4127-1                   security@debian.org
https://www.debian.org/security/                          Thijs Kinkhorst
March 02, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : simplesamlphp
CVE ID         : CVE-2017-12867 CVE-2017-12869 CVE-2017-12873
                 CVE-2017-12874 CVE-2017-18121 CVE-2017-18122
                 CVE-2018-6519 CVE-2018-6521
Debian Bug     : 889286

Several vulnerabilities have been discovered in SimpleSAMLphp, a
framework for authentication, primarily via the SAML protocol.

CVE-2017-12867

     Attackers with access to a secret token could extend its validity
     period by manipulating the prepended time offset.

CVE-2017-12869

    When using the multiauth module, attackers can bypass authentication
    context restrictions and use any authentication source defined in
    the config.

CVE-2017-12873

    Defensive measures have been taken to prevent the administrator
    from misconfiguring persistent NameIDs to avoid identifier clash.
    (Affects Debian 8 Jesse only.)

CVE-2017-12874

    The InfoCard module could accept incorrectly signed XML messages
    in rare occasions.

CVE-2017-18121

    The consentAdmin module was vulnerable to a Cross-Site Scripting
    attack, allowing an attacker to craft links that could execute
     arbitrary Javascript code in the victim's browser.

CVE-2017-18122

    The (deprecated) SAML 1.1 implementation would regard as valid any
    unsigned SAML response containing more than one signed assertion,
    provided that the signature of at least one of the assertions was
    valid, allowing an attacker that could obtain a valid signed
    assertion from an IdP to impersonate users from that IdP.

CVE-2018-6519

    Regular expression denial of service when parsing extraordinarily
    long timestamps.

CVE-2018-6521

    Change sqlauth module MySQL charset from utf8 to utf8mb to
    prevent theoretical query truncation that could allow remote
    attackers to bypass intended access restrictions

SSPSA-201802-01 (no CVE yet)

    Critical signature validation vulnerability.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.13.1-2+deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 1.14.11-1+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4128-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
March 02, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : trafficserver
CVE ID         : CVE-2017-5660 CVE-2017-7671

Several vulnerabilities were discovered in Apache Traffic Server, a
reverse and forward proxy server. They could lead to the use of an
incorrect upstream proxy, or allow a remote attacker to cause a
denial-of-service by application crash.

For the stable distribution (stretch), these problems have been fixed in
version 7.0.0-6+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4129-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 02, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : freexl
CVE ID         : CVE-2018-7435 CVE-2018-7436 CVE-2018-7437 CVE-2018-7438
                 CVE-2018-7439

Multiple heap buffer over reads were discovered in freexl, a library to
read Microsoft Excel spreadsheets, which could result in denial of
service.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.0.0g-1+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 1.0.2-2+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4130-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 02, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : dovecot
CVE ID         : CVE-2017-14461 CVE-2017-15130 CVE-2017-15132
Debian Bug     : 888432 891819 891820

Several vulnerabilities have been discovered in the Dovecot email
server. The Common Vulnerabilities and Exposures project identifies the
following issues:

CVE-2017-14461

    Aleksandar Nikolic of Cisco Talos and 'flxflndy' discovered that
    Dovecot does not properly parse invalid email addresses, which may
    cause a crash or leak memory contents to an attacker.

CVE-2017-15130

    It was discovered that TLS SNI config lookups may lead to excessive
    memory usage, causing imap-login/pop3-login VSZ limit to be reached
    and the process restarted, resulting in a denial of service. Only
    Dovecot configurations containing local_name { } or local { }
    configuration blocks are affected.

CVE-2017-15132

    It was discovered that Dovecot contains a memory leak flaw in the
    login process on aborted SASL authentication.

For the oldstable distribution (jessie), these problems have been fixed
in version 1:2.2.13-12~deb8u4.

For the stable distribution (stretch), these problems have been fixed in
version 1:2.2.27-3+deb9u2.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1394 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 04 March 2018 - 06:52 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4120-2                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 03, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : linux
Debian Bug     : 891249

The security update announced as DSA-4120-1 caused regressions on the
powerpc kernel architecture (random programs segfault, data corruption).
Updated packages are now available to correct this issue.

For the stable distribution (stretch), this problem has been fixed in
version 4.9.82-1+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4131-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 04, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : xen
CVE ID         : CVE-2018-7540 CVE-2018-7541 CVE-2018-7542

Multiple vulnerabilities have been discovered in the Xen hypervisor:

CVE-2018-7540

    Jann Horn discovered that missing checks in page table freeing may
    result in denial of service.

CVE-2018-7541

    Jan Beulich discovered that incorrect error handling in grant table
    checks may result in guest-to-host denial of service and potentially
    privilege escalation.

CVE-2018-7542

    Ian Jackson discovered that insufficient handling of x86 PVH guests
    without local APICs may result in guest-to-host denial of service.

For the stable distribution (stretch), these problems have been fixed in
version 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4132-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 04, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libvpx
CVE ID         : CVE-2017-13194

It was discovered that incorrect validation of frame widths in the libvpx
multimedia library may result in denial of service and potentially the
execution of arbitrary code.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.3.0-3+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.6.1-3+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1395 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 10 March 2018 - 07:27 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4133-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 07, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : isc-dhcp
CVE ID         : CVE-2017-3144 CVE-2018-5732 CVE-2018-5733
Debian Bug     : 887413 891785 891786

Several vulnerabilities have been discovered in the ISC DHCP client,
relay and server. The Common Vulnerabilities and Exposures project
identifies the following issues:

CVE-2017-3144

    It was discovered that the DHCP server does not properly clean up
    closed OMAPI connections, which can lead to exhaustion of the pool
    of socket descriptors available to the DHCP server, resulting in
    denial of service.

CVE-2018-5732

    Felix Wilhelm of the Google Security Team discovered that the DHCP
    client is prone to an out-of-bound memory access vulnerability when
    processing specially constructed DHCP options responses, resulting
    in potential execution of arbitrary code by a malicious DHCP server.

CVE-2018-5733

    Felix Wilhelm of the Google Security Team discovered that the DHCP
    server does not properly handle reference counting when processing
    client requests. A malicious client can take advantage of this flaw
    to cause a denial of service (dhcpd crash) by sending large amounts
    of traffic.

For the oldstable distribution (jessie), these problems have been fixed
in version 4.3.1-6+deb8u3.

For the stable distribution (stretch), these problems have been fixed in
version 4.3.5-3+deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4134-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 10, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : util-linux
CVE ID         : CVE-2018-7738
Debian Bug     : 892179

Bjorn Bosselmann discovered that the umount bash completion from
util-linux does not properly handle embedded shell commands in a
mountpoint name. An attacker with rights to mount filesystems can take
advantage of this flaw for privilege escalation if a user (in particular
root) is tricked into using the umount completion while a specially
crafted mount is present.

For the stable distribution (stretch), this problem has been fixed in
version 2.29.2-1+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1396 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 10 March 2018 - 07:29 PM

------------------------------------------------------------------------
The Debian Project                               https://www.debian.org/
Updated Debian 9: 9.4 released                          press@debian.org
March 10th, 2018               https://www.debian.o...s/2018/20180310
------------------------------------------------------------------------


The Debian project is pleased to announce the fourth update of its
stable distribution Debian 9 (codename "stretch"). This point release
mainly adds corrections for security issues, along with a few
adjustments for serious problems. Security advisories have already been
published separately and are referenced where available.

Please note that the point release does not constitute a new version of
Debian 9 but only updates some of the packages included. There is no
need to throw away old "stretch" media. After installation, packages can
be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from security.debian.org won't have
to update many packages, and most such updates are included in the point
release.

New installation images will be available soon at the regular locations.

Upgrading an existing installation to this revision can be achieved by
pointing the package management system at one of Debian's many HTTP
mirrors. A comprehensive list of mirrors is available at:

https://www.debian.org/mirror/list
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1397 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 13 March 2018 - 06:07 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4135-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 13, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : samba
CVE ID         : CVE-2018-1050 CVE-2018-1057

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

CVE-2018-1050

    It was discovered that Samba is prone to a denial of service
    attack when the RPC spoolss service is configured to be run as an
    external daemon.

    https://www.samba.or...-2018-1050.html

CVE-2018-1057

    Bjoern Baumbach from Sernet discovered that on Samba 4 AD DC the
    LDAP server incorrectly validates permissions to modify passwords
    over LDAP allowing authenticated users to change any other users
    passwords, including administrative users.

    https://www.samba.or...-2018-1057.html
    https://wiki.samba.o...p/CVE-2018-1057

For the oldstable distribution (jessie), CVE-2018-1050 will be addressed
in a later update. Unfortunately the changes required to fix
CVE-2018-1057 for Debian oldstable are too invasive to be backported.
Users using Samba as an AD-compatible domain controller are encouraged
to apply the workaround described in the Samba wiki and upgrade to
Debian stretch.

For the stable distribution (stretch), these problems have been fixed in
version 2:4.5.12+dfsg-2+deb9u2.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1398 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 15 March 2018 - 07:16 AM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4136-1                   security@debian.org
https://www.debian.org/security/                       Alessandro Ghedini
March 14, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : curl
CVE ID         : CVE-2018-1000120 CVE-2018-1000121 CVE-2018-1000122

Multiple vulnerabilities were discovered in cURL, an URL transfer library.

CVE-2018-1000120

    Duy Phan Thanh discovered that curl could be fooled into writing a
    zero byte out of bounds when curl is told to work on an FTP URL with
    the setting to only issue a single CWD command, if the directory part
    of the URL contains a "%00" sequence.

CVE-2018-1000121

    Dario Weisser discovered that curl might dereference a near-NULL
    address when getting an LDAP URL due to the ldap_get_attribute_ber()
    fuction returning LDAP_SUCCESS and a NULL pointer. A malicious server
    might cause libcurl-using applications that allow LDAP URLs, or that
    allow redirects to LDAP URLs to crash.

CVE-2018-1000122

    OSS-fuzz, assisted by Max Dymond, discovered that curl could be
    tricked into copying data beyond the end of its heap based buffer
    when asked to transfer an RTSP URL.

For the oldstable distribution (jessie), these problems have been fixed
in version 7.38.0-4+deb8u10.

For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u5.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4137-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 14, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libvirt
CVE ID         : CVE-2018-1064 CVE-2018-5748 CVE-2018-6764

Several vulnerabilities were discovered in Libvirt, a virtualisation
abstraction library:

CVE-2018-1064

    Denial Berrange discovered that the QEMU guest agent performed
    insufficient validationof incoming data, which allows a privileged
    user in the guest to exhaust resources on the virtualisation host,
    resulting in denial of service.

CVE-2018-5748

    Daniel Berrange and Peter Krempa that the QEMU monitor was suspectible
    to denial of service by memory exhaustion. This was already fixed in
    Debian stretch and only affects Debian jessie.

CVE-2018-6764

    Pedro Sampaio discovered that LXC containes detected the hostname
    insecurely. This only affects Debian stretch.

For the oldstable distribution (jessie), these problems have been fixed
in version 1.2.9-9+deb8u5.

For the stable distribution (stretch), these problems have been fixed in
version 3.0.0-4+deb9u3.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4138-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
March 15, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : mbedtls
CVE ID         : CVE-2017-18187 CVE-2018-0487 CVE-2018-0488
Debian Bug     : 890287 890288

Several vulnerabilities were discovered in mbed TLS, a lightweight
crypto and SSL/TLS library, that allowed a remote attacker to either
cause a denial-of-service by application crash, or execute arbitrary
code.

For the stable distribution (stretch), these problems have been fixed in
version 2.4.2-1+deb9u2.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1399 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 16 March 2018 - 07:02 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4139-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 15, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2018-5125 CVE-2018-5127 CVE-2018-5129 CVE-2018-5130
                 CVE-2018-5131 CVE-2018-5144 CVE-2018-5145

Several security issues have been found in the Mozilla Firefox web
browser: Multiple memory safety errors and other implementation errors
may lead to the execution of arbitrary code, denial of service or
information disclosure.
      
For the oldstable distribution (jessie), these problems have been fixed
in version 52.7.1esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.7.1esr-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4140-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 16, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libvorbis
CVE ID         : CVE-2018-5146
Debian Bug     : 893130

Richard Zhu discovered that an out-of-bounds memory write in the
codeboook parsing code of the Libvorbis multimedia library could result
in the execution of arbitrary code.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.3.4-2+deb8u1.

For the stable distribution (stretch), this problem has been fixed in
version 1.3.5-4+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4141-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 16, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : libvorbisidec
CVE ID         : CVE-2018-5147
Debian Bug     : 893132

Huzaifa Sidhpurwala discovered that an out-of-bounds memory write in the
codebook parsing code of the Libtremor multimedia library could result
in the execution of arbitrary code if a malformed Vorbis file is opened.

For the oldstable distribution (jessie), this problem has been fixed
in version 1.0.2+svn18153-1~deb8u2.

For the stable distribution (stretch), this problem has been fixed in
version 1.0.2+svn18153-1+deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.

#1400 OFFLINE   sunrat

sunrat

    Thread Kahuna

  • Forum Moderators
  • 5,677 posts

Posted 17 March 2018 - 09:00 PM

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4142-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
March 17, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : uwsgi
CVE ID         : CVE-2018-7490
Debian Bug     : 891639

Marios Nicolaides discovered that the PHP plugin in uWSGI, a fast,
self-healing application container server, does not properly handle a
DOCUMENT_ROOT check during use of the --php-docroot option, allowing a
remote attacker to mount a directory traversal attack and gain
unauthorized read access to sensitive files located outside of the web
root directory.

For the oldstable distribution (jessie), this problem has been fixed
in version 2.0.7-1+deb8u2. This update additionally includes the fix for
CVE-2018-6758 which was aimed to be addressed in the upcoming jessie
point release.

For the stable distribution (stretch), this problem has been fixed in
version 2.0.14+20161117-3+deb9u2.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4143-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 17, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : firefox-esr
CVE ID         : CVE-2018-5146 CVE-2018-5147

Richard Zhu and Huzaifa Sidhpurwala discovered that an out-of-bounds
memory write when playing Vorbis media files could result in the
execution of arbitrary code.

For the oldstable distribution (jessie), these problems have been fixed
in version 52.7.2esr-1~deb8u1.

For the stable distribution (stretch), these problems have been fixed in
version 52.7.2esr-1~deb9u1.

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4144-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
March 17, 2018                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : openjdk-8
CVE ID         : CVE-2018-2579 CVE-2018-2582 CVE-2018-2588 CVE-2018-2599
                 CVE-2018-2602 CVE-2018-2603 CVE-2018-2618 CVE-2018-2629
                 CVE-2018-2633 CVE-2018-2634 CVE-2018-2637 CVE-2018-2641
                 CVE-2018-2663 CVE-2018-2677 CVE-2018-2678

Several vulnerabilities have been discovered in OpenJDK, an
implementation of the Oracle Java platform, resulting in denial of
service, sandbox bypass, execution of arbitrary code, incorrect
LDAP/GSS authentication, insecure use of cryptography or bypass of
deserialisation restrictions.

For the stable distribution (stretch), these problems have been fixed in
version 8u162-b12-1~deb9u1.
registered Linux user number 324659  ||    The importance of Reading The *Fine* Manual! :D
Posted ImagePosted ImagePosted ImagePosted Image
For the things we have to learn before we can do them, we learn by doing them.





Also tagged with one or more of these keywords: debian, updates, sunrat, bruno, v.t. eric layton

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users